The Co-operative University of Kenya

Your search returned 31 results.

Not what you expected? Check for suggestions
Sort
Results
Principles of incident response and disaster recovery / Michael Whitman, Ph.D., CISM, CISSP, Herbert Mattord, Ph.D., CISM, CISSP, Andrew Green, MSIS Kennesaw State University.

by Whitman, Michael E, 1964- | Mattord, Herbert J | Green, Andrew, 1952-.

Edition: Second edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston, MA : Course Technology, Cengage Learning, [2014]Other title: Principles of incident response & disaster recovery.Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Karen (1) Call number: HF5548.37 .W55 2014.

Information Assurance for the Enterprise : A Roadmap to Information Security / Corey Schou, Dan Shoemaker.

by Schou, Corey | Shoemaker, Dan.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : McGraw-Hill Irwin, c2007Online access: Publisher description | Table of contents only | Contributor biographical information Availability: Items available for loan: Karen (4) Call number: QA76.9.A25 S3523 2007, .., Nairobi (3) Call number: QA76.9.A25 S3523 2007, ... Items available for reference: Nairobi Not for loan (1) Call number: QA76.9.A25 S3523 2007.

Stealing the Network : The Complete Series Collector's edition / Ryan Russell, Timothy Mullen, Johnny Long.

by Russell, Ryan, 1969- | Mullen, Timothy M | Long, Johnny.

Material type: Text Text; Format: print ; Literary form: Fiction Publication details: Burlington, MA : Syngress, c2009Online access: Publisher description Availability: Items available for loan: Karen (1) Call number: PS648.C65 R87 2009.
Lists:

Security in Distributed Computing : Did You Lock the Door? / Glen Bruce, Rob Dempsey.

by Bruce, Glen | Dempsey, Rob.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Saddle River, NJ : Prentice Hall, c1997Availability: Items available for loan: Karen (3) Call number: QA76.9.A25 D454 1997, .., Nairobi (1) Call number: QA76.9.A25 D454 1997.

How to Cheat at Securing SQL Server 2005 / Mark Horninger, technical editor ; [contributors] Timothy Blum ... [et al.].

by Horninger, Mark.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, MA : Syngress, c2007Online access: Publisher description Availability: Items available for loan: Karen (1) Call number: QA76.73.S67 H69 2007, Nairobi (1) Call number: QA76.73.S67 H69 2007.

Best Damn Firewall Book Period / T.W. Shinder ... [et al.].

by Shinder, Thomas W.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, Mass. : Oxford : Syngress ; Elsevier Science [distributor], c2007Availability: Items available for loan: Karen (1) Call number: TK5105.59 .B466 2007.

The Best Damn IT Security Management Book Period / Bryan Cunningham...[et al].

by Cunningham, Bryan, JD.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, Mass. : Oxford : Syngress ; Elsevier Science [distributor], c2007Availability: Items available for loan: Karen (1) Call number: QA76.9.A25 B486 2007, Nairobi (1) Call number: QA76.9.A25 B486 2007.

Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit / Ryan R. Kubasiak, Sean Morrissey, lead authors ; [contributing authors], Walter Barr ... [et al.] ; Jesse Varsalone, technical editor.

by Kubasiak, Ryan R | Morrissey, Sean | Varsalone, Jesse.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, MA : Syngress Pub., c2009Online access: Publisher description Availability: Items available for loan: Karen (2) Call number: QA76.9.A25 V3854 2009, ...

How to Cheat at Securing your Network [Ido Dubrawksy, technical editor].

by Dubrawsky, Ido.

Series: "How to cheat--"Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, MA : Syngress, c2007Other title: Securing your network.Online access: Publisher description Availability: Items available for loan: Karen (3) Call number: TK5105.59 .H684 2007, ...

Security+ Exam Cram 2 lab manual / Don Poulton, Michael G. Solomon.

by Poulton, Don | Solomon, Michael, (Michael G.), 1963-.

Series: Exam cram 2Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : Que Certification, c2005Other title: Security+ lab manual.Availability: Items available for loan: Karen (1) Call number: QA76.3 .P67 2005.

Homeland Security Techniques and Technologies / Jesús Mena.

by Mena, Jesus.

Series: Charles River Media networking/security seriesEdition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Hingham, Mass. : Charles River Media, c2004Availability: Items available for loan: Karen (1) Call number: QA76.9.D343 M439 2004.

Security for Microsoft Windows system administrators : introduction to key information security concepts / Derrick Rountree.

by Rountree, Derrick.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Amsterdam ; Boston : Syngress, c2011Availability: Items available for loan: Karen (1) Call number: QA76.9.A25 R6766 2011.

Web Application Vulnerabilities : Detect, Exploit, Prevent / Michael Cross, ... [et al.]

by Cross, Michael, 1965-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, MA. : Syngress Pub., c2007Online access: Publisher description Availability: Items available for loan: Karen (1) Call number: QA76.76.A65 W428 2007.

Windows forensics : the field guide for conducting corporate computer investigations / Chad Steel.

by Steel, Chad, 1975-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, IN : Wiley Pub., c2006Online access: Table of contents only | Contributor biographical information | Publisher description Availability: Items available for loan: Karen (1) Call number: HV8079.C65 S84 2006.

CompTIA Security+ Study Guide / Emmett Dulaney.

by Dulaney, Emmett A.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : Wiley Pub., c2009Online access: Table of contents only | Contributor biographical information | Publisher description Availability: Items available for loan: Karen (2) Call number: QA76.3 .D8228 2009, ...

24 Deadly Sins of Software Security : Programming Flaws and How to Fix Them / Michael Howard, David LeBlanc, and John Viega.

by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : McGraw-Hill, c2010Other title: Twenty four deadly sins of software security.Availability: Items available for loan: Karen (1) Call number: QA76.9.A25 H6977 2010.

Managing Information Security Risks The Octave Approach Alberts, Christopher

by Audrey Dorofee.

Material type: Text Text Availability: Items available for loan: Karen (1) Call number: QA76.9 .A43 2002.

Scene of the cybercrime.

by Cross, Michael, 1965- | Shinder, Debra Littlejohn. Scene of the cybercrime.

Edition: 2nd ed. / Michael Cross.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, MA : Syngress Pub., c2008Availability: Items available for loan: Nairobi (1) Call number: QA76.9.A25 C765 2008.
Lists:

Authentication : from passwords to public keys / Richard E. Smith.

by Smith, Richard E, 1952-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : Addison-Wesley, c2001Availability: Items available for loan: Karen (1) Call number: QA76.9.A25 S65 2001.

Hacker's Challenge 2 : Test your Network Security & Forensic Skills / Mike Schiffman ... [et al.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : McGraw-Hill/Osborne, 2003Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: Karen (1) Call number: QA76.9.A25 H32 2003.

Pages

© Cooperative University Library Karen, P. O. 24814-00502 Karen Nairobi Nairobi Kenya
Tel.: +254 020 8891401-4